Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359791
|View full text |Cite
|
Sign up to set email alerts
|

MalRank

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…Zou, et al [19] constructed a client-domain-IP graph and leveraged a propagation algorithm to discover malicious nodes. Najafi, et al, instead proposed the MalRank system [25], which uses information collected by an enterprise's internal SIEM, derived from, for example, proxy, DNS, and DNCP logs, to construct a knowledge graph that identifies malicious entities by calculating and iterating a malicious score over the entities in the knowledge graph. Lei, et al [17] built three domain relation graphs and leveraged the graph embedding technique to obtain features.…”
Section: Graph-based Methodsmentioning
confidence: 99%
“…Zou, et al [19] constructed a client-domain-IP graph and leveraged a propagation algorithm to discover malicious nodes. Najafi, et al, instead proposed the MalRank system [25], which uses information collected by an enterprise's internal SIEM, derived from, for example, proxy, DNS, and DNCP logs, to construct a knowledge graph that identifies malicious entities by calculating and iterating a malicious score over the entities in the knowledge graph. Lei, et al [17] built three domain relation graphs and leveraged the graph embedding technique to obtain features.…”
Section: Graph-based Methodsmentioning
confidence: 99%
“…While such representations are not mapped directly to knowledge graphs, there is a clear link between them. For example, the MITRE ATT&CK 33 framework, which constitutes an industry standard knowledge base of adversary tactics and techniques based on real-world observations, is typically represented as a matrix by default; its concepts and relationships can also be represented as a graph.…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
“…When cyber-knowledge graphs are used to represent cyber-knowledge, whether entities derived from logs or cyberthreat intelligence (which MAC address requested access to which IP or domain, an IP is in which IP address space assigned to which autonomous system, etc. ), cyberthreat detection in SOC/SIEM environments can be formulated as a large-scale graph inference problem [33]. Graph netural networks (GNNs) can be used for graph-based network intrusion detection, capturing both edge features and a network's topological informationas seen in the example of Graph SAmple and aggreGatE (GraphSAGE) detecting malicious information flow in IoT networks [30].…”
Section: Utilizing Machine Learning On Cybersecurity Knowledge Graphsmentioning
confidence: 99%
“…This section aims to discuss how to utilize the KG to analyze and attribute the malware. Najafi et al [130] devised MalRank, a graph-based malware rank inference model aimed to predict a node's maliciousness by its associations with the other entities in the KG, such as common IP ranges or dns servers. This essay presented a KG that builds global relationships among entities detected in proxy and IDS logs, enhanced with related CTI and open-source intelligence (OSINT).…”
Section: Malware Attribution and Analysismentioning
confidence: 99%